Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4956

Опубликовано: 20 авг. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.6

Описание

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.

РелизСтатусПримечание
devel

released

3.2.4-2ubuntu2
lucid

ignored

end of life
precise

released

2.7.11-1ubuntu2.4
quantal

released

2.7.18-1ubuntu1.3
raring

released

2.7.18-4ubuntu1.2
upstream

released

2.7.23,3.2.4

Показывать по

EPSS

Процентиль: 30%
0.00108
Низкий

3.6 Low

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.

nvd
больше 12 лет назад

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.

debian
больше 12 лет назад

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3. ...

github
больше 3 лет назад

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.

fstec
больше 12 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 30%
0.00108
Низкий

3.6 Low

CVSS2